2020
DOI: 10.1016/j.visres.2020.04.010
|View full text |Cite
|
Sign up to set email alerts
|

Saccades reset the priority of visual information to access awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 56 publications
0
3
0
Order By: Relevance
“…It can quickly filter out useful information from a large amount of information and identify it. Most of the programs formulated by artificial intelligence can effectively improve the security of online shopping [14]. As is known to all, the traditional network technology requires a lot of manpower and material resources, while the emerging artificial intelligence technology consumes a very small amount of resources, and the calculation speed of the optimal solution is faster.…”
Section: Artificial Intelligence Technology Andmentioning
confidence: 99%
See 1 more Smart Citation
“…It can quickly filter out useful information from a large amount of information and identify it. Most of the programs formulated by artificial intelligence can effectively improve the security of online shopping [14]. As is known to all, the traditional network technology requires a lot of manpower and material resources, while the emerging artificial intelligence technology consumes a very small amount of resources, and the calculation speed of the optimal solution is faster.…”
Section: Artificial Intelligence Technology Andmentioning
confidence: 99%
“…In order to make this error as small as possible, a minimum value ε is defined, which represents the minimum value between the sample data and the criterion function. e calculation process of the minimum error is as given by formula (14).…”
Section: Legal Protection Mechanismmentioning
confidence: 99%
“…Static analysis refers to analyzing an application by examining its structure and code without execution. Static analysis becomes less efective when the applications use code obfuscation techniques for hiding the code semantics [4].…”
Section: Introductionmentioning
confidence: 99%